Page 2,639«..1020..2,6382,6392,6402,641..2,6502,660..»

Learn how analytics is being used by hospitals today – Hindustan Times

In the healthcare industry, there is an overwhelming amount of information that needs to be processed. Data analytics helps with that. Hospitals rely on data analytics and machine learning tools to manage the databases. These data sources can then be used to predict patient outcomes and care methods.

To work as a data analyst at any healthcare centre, one needs to study business analytics. Imarticus Learning offers courses, including a PGA course that can help students get placed with hospitals and clinics.

In what ways do hospitals use analytics?

Hospitals and other healthcare centres are becoming increasingly reliant on data analytics. Imarticus Learning offers the best course for data analytics, for those who are interested in this field. Before deciding on the course, take a look at the following points to understand how hospitals use data analytics.

Vaccine Prediction and Management

Vaccine production is based on preliminary research and data analytics can give the right resources. It can provide the necessary metrics after going through available data regarding the disease and the conditions of those affected. Hospitals can also use data analytics tools to ensure proper distribution.

Heart Disease Prediction

During a general diagnosis, a vast amount of data is collected. Exploratory data analysis can sift through this data and look for any potential causes of heart disease. This helps save a lot of time and doctors can immediately come up with a course of action.

Care of Patients with Chronic Illnesses

For chronically ill patients, machine learning and data analytics tools are used to provide proper care. These tools can help the hospital staff come up with solutions that will provide long-term relief. Machine learning can also be used to alert the staff if there is any sudden change in a patient.

Treatment Plans

Data analytics can be used by doctors to understand how a patient will respond to certain types of treatments. There is no need to depend on a trial-and-error method. A patient's medical history is used to predict an outcome. Depending on what that outcome is, a treatment plan is decided.

Students can opt for the online data analytics certificate program from Imarticus Learning if they wish to have a career in this field. The course by Imarticus provides in-depth knowledge about data science and analytics, and also about machine learning. There are two modes of training available: classroom and online, and learners can choose whichever is convenient. Since the curriculum has been created with professionals, this data analytics course at Imarticus will prepare students for the industry. At the end of the course, students will get the opportunity to sit for interviews.

Predictive Analytics in Healthcare

Predictive analytics includes the use of statistical tools to understand available facts. Data mining, machine learning, and the use of predictive models help to make accurate predictions based on current and past data. If one wishes to work in this area, one must study business analytics and data science. There are plenty of jobs available, particularly in the healthcare sector.

Due to the Covid-19 pandemic, the efficiency of healthcare services has had to increase tenfold. The only way hospitals have been able to control and combat the conditions is by using data analytics. Predictive analytics have given the necessary information to doctors and healthcare experts. This has led to the fast rollout of vaccines, quick response in treatment plans , and preventive care.

Imarticus Learning's online data analytics certificate program is a great step towards a career as a data analyst or scientist. The course prepares students for placements at top companies, including hospitals. The course also includes project work which helps students develop skills and get hands-on experience. This is the best course for data analytics. It is for new graduates and working professionals, alike. A data science program or DSP from Imarticus Learning will set them up for a stable and successful career.

Disclaimer: This is a company press release. No HT journalist was involved in the creation of this content.

Read more:

Learn how analytics is being used by hospitals today - Hindustan Times

Read More..

Digitally enabled brokers – The future of Indian real estate – Construction Week Online India

The pandemic accelerated the shift to digital for industries everywhere - at the same time, however, it exposed significant gaps in digital capabilities that currently exist in certain sectors. Real estate is among the industries that traditionally relied on physical interaction and was thus forced to rapidly innovate when the lockdown hit. What we are witnessing right now is a transformation of sorts, as digitisation changes the face of how real estate has always been in India.

According to estimates, the real estate sector in India will be worth $650 billion by 2025, contributing to 13% of Indias GDP. Despite the setback to demand after the lockdown, homeowners are once again exploring prospective flats and houses, with home sale units doubling between October and December 2020. With lockdowns getting consistently extended, relaxed and then imposed again, planning for in-person appointments to tour houses is extremely difficult. Real estate firms and developers are thus switching to online options to win customers over and close home deals. This, in fact, marks a big step forward in a trend that had already begun over the last few years - systematic, hassle-free online search for homes. A mix of time-tested technologies and new real estate-specific innovations are being brought in to achieve this. Here are some trends we can expect to see growing over the next few years.

*Multiple listing services - These are portals that act as demand-supply aggregators by displaying all relevant properties sorted by popularity, price and location and thus enable a quick comparative view of whatever is available. This is a first-level filter that helps homeowners choose better and is now a must-have everywhere. These portals are also equipped with data mining capabilities that assess buying and selling trends and can thus proactively anticipate demand.

*utomated operations - In the post-Covid world, real estate agents who do not use technology in their daily lives will fall behind. We will thus witness the use of more digital lead management tools to qualify and generate leads. Paperless documents, ERP systems, online approvals and automatic dashboards are all becoming the norm.

*Customer connections - Forming strong customer relationships will continue to be top priority, even if physical meetings take a backseat. Agents who stay in regular touch with their clients through messaging and social media platforms will see more lead closures, as those customers are likely to remember the agents and to reach out to them when needed.

*Virtual reality - Todays homeowners are no longer interested in just viewing static property images. They expect to be able to tour each property virtually from the comfort of their homes before they even consider paying an actual visit. Companies are responding to this by investing in virtual reality that offers 360-degree virtual tours, immersive experiences for each home. Supplemented by video calls and consistent customer support, this is quickly becoming a popular way for homeowners to close deals without venturing forth unnecessarily. While still in its infancy, this technology is likely to flourish, even after lockdown restrictions have been lifted.

*Cloud-based offices - Real estate agents have to spend a considerable amount of time out in the field. At the same time, renting or leasing a commercial office space is an expense that the current lockdown situation cannot justify. Real estate firms like exp India, Anarock, Squareyards etc. are thus shifting the office experience to the cloud, starting with anytime-anywhere access to entire virtual office setups where employees can log in and experience the sense of community and collaboration that they would in a real-world setup. These virtual solutions can reduce Zoom fatigue and the pressure to always be online, break departmental silos and foster a shared culture to help agents feel less isolated. Simultaneously, firms are investing in the digital education of their agents through online tutorials and universities that focus on real-estate skills as well as soft skills. This equips agents to be more confident and also boosts their lead closure rate, as they deliver the kind of top-notch online experience that customers deserve.

The digital revolution in Indian real estate may have been born out of necessity, but its leading to changes that will benefit the industry in the long-run. Companies are taking serious steps to go digital and adopt cloud-based brokerage solutions without delay, while also empowering the brokers who may not traditionally be comfortable with digital methods. Technology will be at the fore of most real estate decisions from now on, and we can expect positive changes and accelerated industry growth as a result.

Here is the original post:

Digitally enabled brokers - The future of Indian real estate - Construction Week Online India

Read More..

Box: Cloud and data are important, so its time to join – Illinoisnewstoday.com

Over the last 18 months, companies across Europe have had to make many changes to the way they work and collaborate, and the demand for online services is higher than ever.

box A comprehensive suite of tools and services that diverged from traditional tools and services has benefited from this surge in demand. Cloud computing And Cloud storage We are also working on content management.

Therefore, it seems that the companys new EMEA president, Sbastien Marotte, has chosen the best time to join. TechRadar Pro He talked to Marotte about how he settled into a new role and plans for a box across the region.

After spending the last decade at Google, Marotte joined Box and was responsible for growing his enterprise business from scratch.

However, Marotte says he was attracted to Box because of the companys willingness and ability to move from traditional storage to content management. This is moving to something completely different, but its important and central to all business, he says.

Im from a world that has been imposing the message that cloud and data are important for the last five years and extending it to content was very comfortable for me, he said. I will.

We are serious about providing solutions that solve business problems, rather than selling technologies and features. Companies are committed to properly hosting all content connected to their IT systems. , Im convinced that I need a single platform. Level of security and Box brings it to the table.

Marotte emphasized how Box has serious ambitions with respect to EMEA, and the company recently added many prominent customers, such as BT, to its roster.

Not only does he plan to double investment across the region, he says he will continue to support Boxs already strong sales strategy and partner ecosystem.

Especially because Box has a stable enterprise product Hybrid work It is becoming more popular all over the world.

This is a great opportunity for us, says Marotte. The new way of working will be a very hybrid model, so every employee must have the right tools to access the content they need to run their business.

Box expanded into the cloud collaboration market a few years ago and is well equipped to meet these needs. Mariotte adds that by keeping all content in a single platform, enterprises can not only access their data, but also securely access it from anywhere. Device at any time of the day.

He said that the growth of SaaS applications is especially Remote workCan provide enterprises with serious security challenges to overcome and add unnecessary technical debt, but if you can find a way to break silos and protect your data seriously, its serious for Box. This is an opportunity.

Marotte concludes that enabling integrated workflows can enable businesses of all sizes to work smarter and harder, making Box a key partner for businesses across the EMEA region. I am aiming to hire one.

There is no doubt that we can dramatically improve efficiency and productivity, he added.

Read the rest here:
Box: Cloud and data are important, so its time to join - Illinoisnewstoday.com

Read More..

Pure Storage rides the hybrid cloud wave to growth in NZ – Reseller News

All flash storage pioneer Pure Storage is riding the wave of hybrid cloud adoption to success both locally and globally.

Founded in 2009, the company arrived in New Zealand seven years ago and is still led by its first local employee, Stuart Blythe.

While not willing to break out local employee numbers, Blythe said the team now covers sales, presales and the channel. But it is Pure's partners that do the heavy lifting in the market.

"Globally, the company is 100 per cent channel," Blythe said. "We dont sell directly to end users. Everywhere outside of the US is two-tier via distributors."

In New Zealand, that distributor is Westcon.

"We are trying not to saturate market with resellers," Blythe told Reseller News. "It's a value based sell, but the major suspects are infrastructure and data centre focused."

Many are also users of Pure's products as well, with MSPs and SaaS vendors being the company's biggest verticals.

Pure enjoyed strong differentiation as one of first vendors to come to market with all flash products.

In the beginning it focused on customer usages and workloads that could benefit from that because flash costs back then were way more expensive than they are now, Blythe explained.

Consumption of flash is now mainstream, he said. It is just defined as "performance" storage, the Tier 1 for application workloads.

"As that has shifted, the share and visibility and opportunities we have engaged with are much broader than seven years ago," he said.

That has been helped by what he said are unique capabilities in data reduction to use raw NAND flash very efficiently.

With flash now available at lower price points, the total addressable market has also expanded into Tier 2 as well.

"When we brought all flash to market, we did it in a different way," Blythe said. "The founders realised there was a shift."

Other players were retrofitting flash-based storage into disc-based operating systems, but Pure engineered its platform from scratch with advanced data reduction capabilities.

The end-product was 1.5- to two-times more efficient.

Because it was built from the ground up on flash we were able to reimagine the customer experience from an architecture and simplicity perspective," Blythe said.

Simplicity was critical, especially to support and orchestrate the transition from on premises to cloud.

The architecture also had to be non-disruptive to enable upgrades and other changes without down-time.

That architecture also supported a new "evergreen" storage business model that eliminated lift-and-shift upgrades and a price hike every few years.

Blythe said customers can buy an array with three years of support. The gold support option included a non-disruptive upgrade including new controllers in the existing hardware with no additional cost over the next three years.

"It's still capex plus support but once you've bought the asset, you never rebuy it," he explained. "You keep buying maintenance while also subscribing to hardware and software innovation."

As of July, more than 2700 customers globally had experienced non-disruptivestorageupgrades and the average number of upgrades grew 38 per cent year-over-year for the last five years, Pure said.

There was an interesting dynamic emerging in the market with the ascent of hybrid cloud, Blythe said.

Public cloud doesnt necessarily deliver performance, availability and a commercial outcome simply by virtue of a lift and shift. Customers still want very high availability and performance.

Infrastructure-as-a-service (IaaS), for instance, is mostly focused on on-premises style workloads. It is almost a traditional technology stack rather than cloud native.

"A lot of people say going on a cloud journey but need to understand what that means," Blythe said. "It is absolutely becoming a hybrid world."

Rapid recovery, however, is the topic du jour with ransomware attacks both professionalising and proliferating. The ability to get data back very quickly was an emerging flash storage use case.

"We have customers using flash for back up," Blythe said. "It's counter intuitive for speedy recovery."

In essence, flash has spread from tier 1 all the way down to tier 4.

To address the needs of software-as-a-service (SaaS) vendor customers, Pure built an "immutable" snapshot capability into its products. Even administrators cant get access to it.

Because ransomware infiltration typically happens weeks even months before a ransom demand is made, the ability to keep point-in-time snapshots and to allow rollback and recovery at high speed is being seen as very beneficial.

Winning customers has proved key to winning partners, Blythe said.

"We have a lot of the traditional partners with long standing vendor relationships that they are happy and comfortable with and dont want to disrupt," he said.

"But when you start winning a couple of customers off them, you start being taken notice of. They come based on the success they see we are having."

In that context, customer satisfaction is key and Pure puts great store on net promoter score (NPS). That also puts the company in Tier 1, with NPS sitting at around 83.5.

Local customers include TSB, Toyota Financial Services, Ballance Agri-Nutrients, BCS Group and Kensington Swann.

Last September, Pure bought Portworx a data storage and management specialist focused on the Kubernetes market.

That delivered another set of partners with capabilities, services and value that were not based around data centre infrastructure.

"They are very much focused around concept of data mobility cloud is not a destination," Blythe said. "Portworx will give that abstraction to make data mobile in the cloud."

The goal there was to give customers both an on-premise enterprise experience that was more cloud-like and to make some cloud based infrastructure operate more like enterprise storage.

Error: Please check your email address.

Tags storageflash storagePure Storagehybrid cloudCloud

Link:
Pure Storage rides the hybrid cloud wave to growth in NZ - Reseller News

Read More..

Is Google reading content of files you upload to Google Drive? – TWCN Tech News

After Google made an announcement that its cloud storage service Google Drive will ban the distribution of misleading content, a flurry of comments with speculation and synopsis has been doing rounds. Some strongly believe, under the garb of banning the distribution of misleading content Google is reading content uploaded by users to the Drive.

Firstly, we should note that the decision taken is not about private files but its distributing content. Google doesnt necessarily spy on its users private files but scans them when you share them publicly. For example, if someone keeps all the pirated movies, he/she wants on his/her Drive, and gives private access to friends, Google will instantly restrict its access after scanning its contents. As such, this scheme doesnt apply to your private files or privately shared documents They are only acting only on complaints.

We need to curb abuses that threaten our ability to provide these services and we ask everyone abide by the policies to help us achieve our goal. After we are notified of a potential policy violation, we may review content and take action, including restricting access to content, removing the content and limiting or terminating users access to Google products, reads the Abuse Program Policies and Enforcement of Google Docs.

Secondly, it is worth pointing out that cyber-criminals make sincere efforts in keeping their communications secret instead of hosting them in plain text on the servers of tech giants like Google.

We agree, theres no such thing as absolute free speech with no limits. However, a reputed search giant like Google cant go that far (reading your private files) in preventing misinformation. The maximum they can do is disallow things that could have a direct bearing on the democratic setup.

Whats your take on the story? Share your thoughts with us in the comments section below.

Source Hacker News.

Read this article:
Is Google reading content of files you upload to Google Drive? - TWCN Tech News

Read More..

Bottom Line: When will ransomware attacks hit the Upper Valley? They already have – Valley News

No longer is it just a matter of time until an Upper Valley institution, business or town gets hit with a ransomware attack. Its already happened. Cybersecurity experts say it will keep happening, and anyone who depends on a computer network to run their business, school or town in other words, everyone should be prepared.

Yes, theyve happened. Can I talk about them? No. But they happen, said Ray Coffin, founder of All-Access Infotech, a Fairlee information technology consultant who builds and manages IT systems for small and medium businesses in the Upper Valley. Its at the forefront of every conversation were having.

Unless youve been living off the grid (and some do in the Upper Valley) and are blissfully unaware, barely a day passes when a business if not an entire industry is held hostage by a ransomware attack. Its a thriving extortion racket: One study estimates that a total of $406 million in ransom money was paid out to perps in 2020, up 337% from 2019.

The M.O. is familiar: A shadowy group many are said to emanate from inside countries like Russia, Iran and North Korea who are hostile to the U.S. seizes control of a targets computer networks and demands money be paid before supplying the key that unlocks the seized network.

Prominent recent ransomware examples include the attack on the Colonial Pipeline, which carries gas to the East Coast and was shut down until the operator paid $4.4 million. Another attack on JBS, which processes 20% of the countrys meat supply, led to a payment of $11 million to bring its plants back online.

When I thought about which businesses in the Upper Valley might be smart about mitigating against the risk of a ransomware attack, Hypertherm was the first to come to mind.

The Hanover-based, employee-owned company is a world-class manufacturer of plasma and waterjet cutting technology.

Hypertherm sells a hefty percentage of its products in the international market and relies upon a global supply chain for materials, thereby raising its risk profile because bad actors could have numerous entry points into its networks.

And, I learned, Hypertherm was an early ransomware victim.

Back in 2010, we were hit three times in less than a year, and it took down production for a half a day, said Robert Kay, IT chief at Hypertherm. We did not pay any ransom and were able to use our backups to restore operations, but it became clear this was a problem we had to address.

The ransomware attack, Kay said, kicked off an action plan that reviewed everything from the companys IT infrastructure to employee interactions with company systems that elevate risk. Kay declined to name specific measures, but one of the actions it has taken is to bring on a security expert with advanced training who has been qualified to join in FBI briefings on cybersecurity threats.

The in-house cyber specialist is also a certified ethical hacker that allows them to be trained in the latest hacking techniques and skills in order to penetrate the companys computer operations to discover vulnerabilities and fix them.

We get attacked often, Kay said. But so far, thanks to the seriousness in which Hypertherm has responded to the threat, we havent been impacted.

The company also carries ransomware insurance, he said.

In a scenario perhaps most relevant for the Upper Valley, the computer system of Leonardtown, a small town in rural Maryland, was shut down after it was exposed to a ransomware attack through the vendor that operated the towns IT system, which in turn relied on software of a targeted company.

Although the town itself was not directly attacked, the incident destroyed the data files the town used to meet its payroll and send out quarterly utility bills to its 3,000 residents.

Lebanon City Manager Shaun Mulholland said that kind of situation is one of the reasons he prioritized switching IT firms and beefing up the citys internal IT department shortly after he took over in Lebanon in 2018.

After an assessment of the citys IT infrastructure found significant weaknesses, they had to totally revamp the whole system, said Mulholland, a former police chief in Allenstown, N.H.

The city spent $750,000 to upgrade IT security, including a new computer system that operates the citys water and sewer plants.

There were a lot of things people could hack into, he said.

And although Mulholland said Lebanon has not been the target of ransomware attack, the city is regularly inundated with so-called phishing attacks that attempt to trick city employees into revealing their passwords in order to hack into email and other accounts.

Now that Lebanons cybersecurity has been improved nobody is 100% secure, Mulholland acknowledged the next step will be to conduct tests with city employees by a cybersecurity firm that will check how on guard city workers are about protecting passwords and information that could result in a bad actor hacking into the citys computer networks, Mulholland said.

Mulholland explained the testing will be to ensure city employees are following protection protocols and to coach them if they make mistakes and not to discipline anyone over errors.

Nobodys going to get into trouble, he said.

Most small, mom-and-pop businesses do not have Lebanons budget to plug holes in their computer systems, but there are still things they can do to minimize the risk of a ransomware attack, according to IT consultant Coffin.

Make sure all your data is backed up on a cloud provider and cloud storage, Coffin said, explaining that if a business finds it is locked out of its data files it can easily pivot to the backup files and will not be compelled to pay the attacker for the key to get the data back. The only data the business would lose is the data since the last backup procedure.

Of course, a business has to pay a cloud storage provider like Amazon or Microsoft and, ranging in cost anywhere from less than a hundred dollars per month to $1,000 per month depending on the amount of the data to be stored, that can be a large expense for a small company, such as a farm stand or handcrafts maker with an online sales platform.

But skimping to pay for protection may only lead to bearing a steeper cost later.

It should be looked at like rent, one of those expenses in the budget line, Coffin said.

Contact John Lippman at jlippman@vnews.com.

See the original post here:
Bottom Line: When will ransomware attacks hit the Upper Valley? They already have - Valley News

Read More..

Healthy Komprise doubles revenues and partners AWS in health sector Blocks and Files – Blocks and Files

In corporate wellness news, Komprise has doubled its revenue in the first six months of 2021 and is partnering with AWS to sell cloud-tiering data services into the health sector.

The company sells data management lifecycle technology, which can identify ageing, less-accessed files and move them to lower-cost storage tiers, including Amazons S3 and S3 Glacier cloud vaults. Komprise has an Elastic Data Migration offering, which provides file data migrations to Amazons Elastic File System (EFS) and FSx for Windows File Server, also Azure Files. Users access files from their original locations, and can access their data in AWS, with the option to access it directly versus rehydrating files back to the primary storage.

Komprise says first half 2021 revenues rose 97 per cent year on year and it had 190 per cent new customer growth and 200 per cent average deal size growth. That is healthy.

CEO Kumar Goswami said in a statement: Customers are adopting Komprise because we not only find and move the right data to the cloud, but we tier data without users and applications noticing any change and without locking data in the cloud in a proprietary format.

The company announced it has been awarded a patent that extends the capabilities of its Transparent Move Technology (patented in 2019) to enable asynchronous restoration of files from delayed recall storage such as tape. This patent was a joint application with tape system and secondary storage vendorSpectra Logic.

We think a Komprise and SpectraLogic partnership marketing initiative might hit the streets later this year.

The health sector partnership with AWS builds upon a deal with pharmaceutical giant Pfizer. Komprise says it helped Pfizer stop 20 years of increasing storage costs and leverage its data tiered to AWS for research, without changing how users and applications access their files. A July 22 AWS webinar will discuss Pfizers use of Komprise and AWS cold storage technology.

Komprise was started up in 2014 and has taken in a relatively small $42 million in funding, with the last round taking place in 2019 and raising $24 million. This is small potatoes compared to data protection and management startups like Cohesity ($660M) and Rubrik ($552M+) but on a par with other file lifecycle management startups like StrongBox ($27M).

The three founders are Goswami, President and COO Krishna Subramanian, and CTO Michael Peercy. The threesome set up Kaviza to replace SAN storage in VDI and sold it to Citrix in 2011. Previously they founded Kovair, a software tools company which is alive and prospering.

Komprise has partnerships with HPE, Pure Storage, and works with AWS, Azure and NetApp Cloud Volumes. It clearly has tech that works with other suppliers kit.

We think Komprise could possibly IPO, but its more likely that it will be acquired for its file scanning, indexing, transparent move and analytics technology. It would be a good fit for for any larger IT supplier looking to move into hybrid cloud data management. Dell is aiming to move into the data management market. Just sayin.

See the article here:
Healthy Komprise doubles revenues and partners AWS in health sector Blocks and Files - Blocks and Files

Read More..

Shailesh Haribhakti discusses audit renaissance and the deployment of cyber and digital security measures – Free Press Journal

Boards across the world now recognise that nothing short of an audit renaissance will make them feel satisfied about their oversight on cybersecurity challenges. The feared trillion-dollar number has entered the fear factor gauge as infrastructure breakdowns, halting of operations, ransomware demands and egregious data leakages have grabbed headlines all over the world. Some of the most sensitive organisations in the world have fallen prey, despite massive investment in cybersecurity!

The basic three-part renaissance required can be summarised as follows:

1. Raise global awareness about the subject: Use examples, videos, drawdowns from repositories, sessions by experts and a cutting-edge self-study module available for widespread free usage.

2. Build a culture of safety: Nothing short of global cooperation will work. All incidents, patches, clever attempts to steal, closed down operating assets and restarting strategies must be uploaded to a global repository. Access to the repository must be authorised, universal and uninterrupted. Custodians for this repository should be Central banks of the largest 10 nations on earth, by rotation. All tools, protocols and frameworks that create safety must also be universally shared.

3. Build human and mechanical competence to detect early and counter threats: No lags in continuous monitoring and auditing should be tolerated by the system. Any post facto checks can only be useful as future learnings about attempted attacks. Any breach is too costly to afford and therefore must immediately be uploaded to the repository. As the repository is a true universal asset, it will acquire the status of being protected, curated and shared universally.

Only an establishment with infrastructure of this quality will support unstoppable enhancement in computer power, as quantum computing comes online. Storage and retrieval systems will also have to be constantly kept in a state of accelerated improvement. The battle between the forces of good and the evil will have to be transported to cyberspace. Knowledge and vigilance must trump greed and fear!

I invited three organisations whose boards I chair, to share their policies and practices. Am here, sharing these practices which have evolved over years of effort to serve as examples how all can learn and improve by sharing:

Lessons from Blue Star Limited

Cybersecurity risk management is a process of swift detection of emerging risks, assessing their potential impact, and determining how to respond in an agile manner if those risks materialise. A cybersecurity management strategy is kept refreshed at all times, as experience builds.

Effective cybersecurity risk management happens on a continuous basis, both at cultural and operational levels.

Blue Star has enhanced its cyber risk management framework through the following initiatives:

Establishing Culture

While developing a cybersecurity risk management programme, the first thing to initiate is embedding it in the companys culture. The average cost of a cyberattack is approximately $1 million, and 37 per cent of organisations attacked have had their reputation tarnished as a result of the attack. This is why a cybersecurity-focused culture must be established at all levels in the organisation, to prevent loss.

An important aspect is guarding against vulnerable human behaviour. This is done by adequate training and awareness to recognise phishing emails and other social engineering attacks.

Security Operations Centre (SOC)

Blue Star implemented Security Operations Centre services that house an information security team responsible for monitoring and analysing the security posture on an ongoing basis. The SOC team works closely with the organisation incident response team, to ensure that security issues are addressed quickly upon discovery.

Benefits of SOC to Blue Star:

1. Monitoring of security-related incidents round the clock and correlating them with global emerging threats.

2. Proactively hunting for targeted attacks, advance threats, and campaigns.

3. Developed the ability to ward off a ransomware attack

4. Reduction in the incident investigation and remediation time.

Vulnerability Assessment and Penetration Testing (VAPT)

Periodic comprehensive VAPT testing is a strictly disciplined activity. This includes Application Security review, Wi-Fi Penetration testing, Infrastructure Penetration Test, Endpoint Security Review and Secure Configuration Review for Servers & Networks.

Secured Websites

Deployed SSL certificates for web portals; security standard compliance extended to software partners.

Information Security Policy

A set of policies and procedures has been formulated to ensure users understand and comply with a set of guidelines on handling of information stored within Blue Stars network and systems.

Information Rights management tool

Data residing in unsecure locations is accessible to individuals who must not have access to it. This is a common use case within any organisation, where unintended user groups gain access to data. Such a situation may cause data leakage to parties which do not have the organisations best interests in mind.

Blue Star has deployed Seclore software, to protect sensitive information flow. This helps to protect sensitive data that is shared between internal users and user groups m. Pre-defined permission policies to documents stored in file repositories and file server folders are in place. When a document is added to the repository or the folder, permissions for print, copy, forward are attached to the document. Only certain groups of users are allowed access to sensitive documents.

Protection during Internet Access

Data on employees laptops are protected at all times. Even when employees are outside the Blue Star network i.e. when they are accessing the Internet over less secure and vulnerable public Wi-Fi connections or from home. An intelligent guard is installed carefully to protect against malicious websites, viruses, worms and Trojans. This is especially important when almost all of our organisation is working remotely.

Also, there might be incidents when some of us inadvertently access links that may be malicious. This is where the Zscaler Cloud Proxy tool kicks in to guard employees machines while accessing the Internet. The tool also offers a dashboard that provides important MIS on overall security and usage.

Backup and restoration

Blue Star has enhanced its data protection by introducing an enterprise class back-up and restoration tool to retrieve data during any cyber or other disruptions.

Insurance Policy

Cyber Insurance Policy has been obtained, to protect the company from loss incurred from corruption of its data from unauthorised software, computer code or third-party data, wrongful appropriation of network access code, disclosure of third-party data by the companys employees etc.

Cybersecurity insight from L&T Financial Holdings Ltd

The potential data loss from a hack per company could run into millions per year. One failure to defend against a hack can spell disaster. Most of the attempts get repulsed at the external firewall-level itself.

Key aspects of defence (It is more or less like Army defence of land):

1. Be aware of possible avenues of breach. Examples are third party APIs, vendor access to systems etc. These are more vulnerable.

2. Invest proactively to strengthen the posture of defense.

3. Create awareness among all employees on Cybersecuritys importance and reduce chances to accidentally or intentionally leak information outside. Access control and development codes are held in code repository instead of individual machines.

4. Have multi-layered architecture to ensure that the attacker, if successful, does not get deep within.

5. Everyone has a role to play in defence and it is not only the cybersecurity teams job. While that team leads the effort, others have to complement.

6. Regular sharing of practices among companies. This builds overall environment against attackers and they get less encouragement.

System malfunction is curtailed. Despite security checks which may increase the per transaction time taken are weeded out continuously as new techniques become available.

Access controls might deny usage option to genuine users sometimes. Potential mitigants that we apply are as under:

1. Sanity testing of production systems before making it live.

2. Performance testing post implementation of information security controls with simulated traffic in pre production environment.

A critical aspect is: How exactly does information security get staffed? For most of the evolved functions, a separate layer which conducts audit is deployed i.e. internal audit and statutory auditors. Information security must avoid inherent conflict of interest, as providing security and audit are separated.

Information security is a new function but slowly Internal audit function is being beefed up through reskilling Statutory auditors also have to pick up the slack as they get into ESG and technology driven continuous audits.

Insights from NSDL e-Governance Infrastructure Limited

There are six pillars around which IT security has been thought through. They are :

IT Infrastructure security

Application security

Endpoint security

Third-party risk assessment

Business resilience and

Security governance.

1. IT Infrastructure security - covers aspects like server patching, network security, firewalls, access etc. for both cloud and on-premises infrastructure. This is a monthly activity to update all patches and secure all bases.

2. Application security - covers all APIs, mobile applications and all existing workflow applications. All changes have to be first cleared through information security and the testing of production environment is also done.

3. Endpoint security - since we are BYOD company, basically this operates under zero-trust policy. Tools are deployed to ensure the checkpoint between device and our network layer. Also, monitoring of end device is in place.

4. Third-party risk - we have a large ecosystem of third parties comprising of fintechs, bureaus, call centres, vendors and other technology partners. We try to have controls over them through either direct control using audits, or we give them pointers for self-certification. Self-certification is used in case of large companies only.

5. Business resilience - basically, around ensuring applicability of DR or ensuring that applications are in high-availability mode to ensure business continuity in case something goes wrong.

6. Security governance - last but not the least, regular review on our status. Monthly security posture review by CDO and CRO. In addition, this also gets reviewed at Board committees of RMC and IT strategy.

Some of the important cyber and digital security measures deployed are:

1) Global Standards and frameworks that are most widely and successfully used. A yearly update is mandatory.

2) Multilevel, defenceindepth security architecture deployment. Data traffic is subjected to at least 4-5 levels of scrutiny / checks (using different methods) before it reaches the main system.

3) Daily automated scanning of application systems and infrastructure is done to early detect any new known vulnerabilities. Findings are reviewed / verified and an action plan defined to fix these vulnerabilities. Counter-measures such as Web Application System (Machine learning based) are deployed for preventing the exploitation of vulnerabilities that need time to fix (due to upgradation of version or application dependency).

4) Security posture (attack surface assessment) and benchmarking against the peers in the industry is carried out using automated platform-based services. A real-time dashboard helps regular monitoring and planning of action to maintain / enhance the posture.

5) Zero trust approach Role-based access is followed. Internal users also dont get to access the system directly. Firewall rules determine who will be allowed access. Privileged users dont have access to credentials. Intermediate system logs using securely stored credentials and each action is logged/ anonymised.

6) Industry standard key strengths and algorithms are adopted. This applies to all three phases, data in motion, data at rest and data in use.

7) Unstructured data is monitored based on the policy defined by the respective data owners. Data leak prevention systems block the data, disallowing its transfer through any channel (removable storage, web based storage, print or email).

8) Emails contain critical information, as these are the most preferred channels of communication. Therefore, email on mobile is provided only through separate secured container within users' mobile devices. This provides features such as disallowing copying data attachments outside the container, taking screenshots etc. If email is forwarded, DLP rules would apply.

9) Data traffic of all the above technologies / devices is monitored 24 X 7 with help of state-of-the-art tools and fine-tuned processes and skilled resources. Correlating events, detecting anomalies and triggering a ticket to resolver group is an automated process.

10) Well-thought-out cybersecurity / information security policy and process are deployed to ensure uniformity of action to meet the organisation security objectives. Continuous review and finetuning is undertaken to ensure robustness. Review is done up to the board level for critical cybersecurity policy.

11) Continuous security awareness training is provided to all the employees of all levels. Awareness sessions are conducted for top management and board members.

12) All these controls are audited on continuous bases by internal auditors / independent experts as well as the certification auditors and reported to the audit committee of the board.

Cybersecurity is receiving adequate attention at the highest levels and awareness is getting widespread. The battle is on. Winners will be the diligent and vigilant.

The writer is a corporate leader based in Mumbai. He is a chartered and cost accountant and writes regularly on the Indian economy and public policy

Read the original:
Shailesh Haribhakti discusses audit renaissance and the deployment of cyber and digital security measures - Free Press Journal

Read More..

Use these metrics to get the most out of your engineering team – VentureBeat

All the sessions from Transform 2021 are available on-demand now. Watch now.

This post was written by Rob Zuber, CTO of CircleCI

Ive been leading software teams for more than 20 years and one thing Ive learned about metrics is that leaders tend to put too much emphasis on engineering metrics alone, without considering the bigger picture.

After speaking to a range of engineering industry leaders, and poring over millions of jobs processed from software teams worldwide, we found that the most insightful and relevant metrics fall into three categories:

Engineering velocity metrics measure the speed and efficiency of software delivery pipelines its the metric category that managers typically pay the most attention to. While Ill explain why its not the only important category to track, velocity metrics are critical in helping teams identify slowdowns and find ways to optimize their overall performance.

Some of the most common velocity metrics include:

Moses Mendoza, former Head of Engineering at data processing and review platform Zapproved, uses throughput to understand the pace of his teams work.

Throughput helps us identify and understand speed but the throughput of a system is also bound by its primary constraint, Mendoza said. Throughput will show you what the slowest issue is in a chain of events, but it wont show you how to fix it to speed up your work.

Graeme Harvey, an engineering manager on my team, emphasizes that its important for all engineers to customize throughput measurement to their individual team.

Because our team practices pair-programming, measuring throughput isnt something that can be tied to an individuals productivity, Harvey said.

When it comes to throughput, his engineers optimize for the team rather than the individual. Pair-programming and helping each other might feel like its impeding the progress of an individual but in actuality, it refocuses energy on whats most important for the team and ultimately the business.

While throughput is a valuable metric that helps you track output, there is no one-size-fits-all way to measure it. Measuring throughput accurately requires you to evaluate the structure of your team and how you work.

According to Alex Bilmes, former VP of Growth at software configuration tool Puppet, there are two ways to measure change lead time. One way to measure change lead time is to look at how long it takes to get an idea out and for the idea to go full cycle. The other way is to look at deployment lead time, which measures how long it takes to get to production after a developer has pushed the change to production.

Full change lead time will point out issues in communication and understanding, as well as the depth of your backlog. Deployment lead time is more likely to show the quality of your pipelines and tooling.

Sprint velocity measures the amount of work a team can tackle during a single sprint and can be used for planning and measuring team performance.

Tom Forlini, CTO at video conferencing platform Livestorm, dives even deeper when measuring velocity, focusing on three smaller metrics:

Livestorm engineers work on two-week sprints and have 50 story points per sprint, Forlini said. We track the number of issues done vs. planned because it gives us a good indication of the sprint planning quality between Product and Tech.

Then, his team looks at the percentage of issues by type. When a sprint contains only new feature issues, we know from the start that it might be quite a challenging sprint to tackle, Forlini added. Ideally, you should balance the type of issues by sprint as much as possible.

Morale metrics are probably the most overlooked metric category in engineering. They tell you how engineers feel about the quality of their work and their job happiness, which is a major retention factor. Keeping retention high means keeping morale high.

Some common morale metrics include:

At Zapproved, Mendoza tracked morale in order to monitor employee retention. We measured morale at work using surveys, having conversations, and asking managers to dive deeper in one-on-one meetings to find out how employees felt.

If responses to a survey are overwhelmingly positive, youll want to know what is working and how to replicate that positive work environment. Similarly, if responses are negative, its helpful to find out directly from your team why they feel that way and what you can do to fix the problem.

Mendoza at Zapproved measured confidence by reviewing every sprint in conjunction with that teams manager and their scrum master. As we measured code quality confidence over two or three sprints, if we saw code quality tanking, it meant something was wrong with how the teams planned their individual investment with the work, says Mendoza.

The engineering managers that I lead also measure work by confidence.

Focusing on confidence over coverage as a metric requires that the emphasis isnt on code coverage, Harvey added. Its critical to break the reliance on having 80% or 90% code coverage and then shipping it only to find out the code is broken. Test coverage is a partial proxy for code confidence. If you know 95% of your code is fully tested, versus 20%, then youre going to feel pretty confident that if your tests pass, your code is legitimate.

Harveys team focuses on delivering small iterations quickly. This provides the confidence that the team is building something of quality, nothing is broken, and theyve made the right choices in building tools for the dashboard.

Everything an engineer does should propel the company forward. Thats why its also essential to track business metrics.

Some common business metrics include:

Tracking business metrics is how your team accommodates for user growth effectively. According to Yixin Zhu, formerly of Uber, while its essential to look at engineering execution metrics, its also important to be dialed into the businesss goals and to measure the company growth.

As Uber grew exponentially, tracking business metrics was incredibly important in order for Zhus engineering team to succeed. When youre talking about doubling every six months, you have to be tracking that to know what you need to build, what degradations to expect, how many data centers you need, how many boxes, etc., Zhu said.

In short, engineers have to keep an eye on real-time business metrics to project and plan accurately. You have to be proactive, Zhu added.

Here are some tips to help you get the most value out of your engineering efforts:

Rob Zuber (@z00b) is the CTO of CircleCI. He leads a team of 250+ engineers who are distributed around the globe. He is a three-time founder and five-time CTO, currently living in Oakland, CA with his family.

Go here to see the original:

Use these metrics to get the most out of your engineering team - VentureBeat

Read More..

Why we need engineers who study ethics as much as maths – The Conversation AU

The recent apartment building collapse in Miami, Florida, is a tragic reminder of the huge impacts engineering can have on our lives. Disasters such as this force engineers to reflect on their practice and perhaps fundamentally change their approach. Specifically, we should give much greater weight to ethics when training engineers.

Engineers work in a vast range of fields that pose ethical concerns. These include artificial intelligence, data privacy, building construction, public health, and activity on shared environments (including Indigenous communities). The decisions engineers make, if not fully thought through, can have unintended consequences including building failures and climate change.

Read more: Why did the Miami apartment building collapse? And are others in danger?

Engineers have ethical obligations (such as Engineers Australias code of ethics) that they must follow. However, as identified at UNSW, the complexity of emerging social concerns creates a need for engineers education to equip them with much deeper ethical skill sets.

Engineering is seen as a trusted and ethical profession. In a 2019 Gallup poll, 66% rated the honesty and ethical standards of engineers as high/very high, on a par with medical doctors (65%).

However, ethics as a body of knowledge is massive. There are nearly as many academic papers on ethics as mathematics, and clearly more than on artificial intelligence.

With such a rich backdrop of knowledge, engineers must embrace ethics in a way that previous generations embraced mathematics. Complex societal problems make much greater demands on engineering thinking than in the past. We need to consider whole and complex systems, not just issues as individual challenges.

Read more: Most buildings were designed for an earlier climate here's what will happen as global warming accelerates

The construction industry provides a topical example of such complexity. Opal Tower in Sydney, Lacrosse building in Melbourne, Grenfell Tower in London and Torch Tower in Dubai became household names for all the wrong reasons.

Importantly, these issues of poor quality and performance dont arise from new technology or know-how. They involve well-established technical domains of engineering: combustible cladding, fire safety, structural adequacy and so on. A fragmented design and delivery process with unclear responsibility and/or accountability has led to poor outcomes.

These issues prompted the Australian Building Ministers Forum to commission the Shergold Weir Report, followed by a task force to implement its recommendations across Australia.

There are real shortcomings in the legal and contractual processes for allocating and commoditising risk in the industry. However, ethics should do the heavy lifting when legal frameworks are lacking. One key question is whether erosion of professional ethics has played a part in this state of affairs. The answer is a likely yes.

Engineers face ethical dilemmas such as:

Should I accept a narrow or inadequately framed design commission within a design and build delivery model when there is no certainty my design will be appropriately integrated with other parts of the project?

How can I accept a commission when my client provides no budget for my oversight of the construction to ensure the technical integrity of my design is maintained when built?

How do I play in a commercially competitive landscape with pressures to produce "leaner designs to save cost without compromising safety and long-term performance of my design?

"Do I hide behind the contractual clauses (or minimum requirements of codes of practice) when I know the overall process is flawed and does not deliver quality and/or value for money for the end user?

Or worse: Do I resort to phoenixing to avoid any accountability?

Read more: Lacrosse fire ruling sends shudders through building industry consultants and governments

The enduring connection of Aboriginal Australians to Country requires engineers to navigate ethical considerations in Indigenous communities. Engineers must reconcile the legal, technical and regulatory requirements of their projects with Indigenous cultural values and needs. They might not be properly equipped to navigate ethical scenarios when they encounter unfamiliar cultural connections, or regulations are insufficient.

Consider, for example, the sacred sites of the McArthur River Mine. Traditional owners have raised concerns that current mining activities do not adequately protect sacred and cultural heritage sites. Evidence given by community leaders provides insight into the intimate and diverse relationship that traditional owners have with the land.

In considering such evidence, engineers must be able to evaluate both physical site risks (such as acidification of mine tailings and contamination of water bodies) and cultural risks (such as failing to identify all locations of cultural value).

How might we tackle such complicated projects? By properly engaging with traditional communities and by having diverse teams with multiple worldviews and experiences, along with strong technical skills. The broad field of ethical knowledge provides the skill sets to attempt to reconcile the diverse considerations.

Read more: Juukan Gorge inquiry puts Rio Tinto on notice, but without drastic reforms, it could happen again

Engineering students ethical development requires a holistic approach. One assessment suggested:

[] that institutions integrate ethics instruction throughout the formal curriculum, support use of varied approaches that foster highquality experiences, and leverage both influences of cocurricular experiences and students desires to engage in positive ethical behaviours.

The curriculum should include:

skills/expertise the underlying intellectual basis for discerning what is ethical and what is not, which is much more than codes of conduct or a prescriptive, formulaic approach

practice practical know-how in terms of ethical solutions that engineers can apply

mindset having an individual and group culture of acting ethically. The engineers problem-solving mindset must be supplemented by constant reflection on the decisions made and their ethical consequences.

Ethics is not an add-on subject. It must permeate all aspects of tertiary education teaching, research and professional behaviour.

While the arguments for acting now are strong, market realities will also drive the process. The upcoming generation will likely displace those who are slow or reluctant to adapt.

For instance, engineering firms are under pressure from their own staff on the issue of climate change. More than 1,900 Australian engineers and nearly 180 engineering organisations have signed a declaration committing them to evaluate all new projects against the need to mitigate climate change.

Future engineers must transcend any remaining single-solution mindsets from the past. Theyll need to embrace a much more complex and socially minded ethics. And that begins with their university education.

Continued here:

Why we need engineers who study ethics as much as maths - The Conversation AU

Read More..